Follow us on Twitter
twitter icon@FreshPatents


Public Key patents

      

This page is updated frequently with new Public Key-related patent applications.




 Fast multicast messaging encryption and authentication patent thumbnailFast multicast messaging encryption and authentication
To prevent legitimate message recipients from forging new messages and to encrypt messages for a specific set of recipients (channel), a root key is encrypted and combined with a base session management key to render a combined root key, which in turn is encrypted with a public key of at least one recipient device render a session management key. The public key of each “n” intended recipient device encrypts the combined root key to render “n” session management keys.
Sony Computer Entertainment America Llc


 Method for certification by a control unit of a vehicle patent thumbnailMethod for certification by a control unit of a vehicle
A method for performing certification by a control device of a vehicle including generating a first signed certificate, which has at least one public key, and generating an associated private key; single-time introduction of the first signed certificate and of the associated private key into the control device; producing a second certificate; signing a further public key in the control device, using the private key and the second certificate; and making available the signed further public key together with the first signed certificate.. .
Volkswagen Ag


 Method and system for asymmetric key derivation patent thumbnailMethod and system for asymmetric key derivation
A method for asymmetrical key derivation by a signing entity for a terminal including introducing identical cryptographic material into the signing entity and into the terminal; deriving in each case a private key from the cryptographic material in the signing entity and in the terminal; calculating in each case a public key from the private key in the signing entity and in the terminal; generating a signature and/or a signed public key in the signing entity; transferring the signature and/or the signed public key from the signing entity into the terminal; and appending the signature of the signing entity to the public key in the terminal.. .
Volkswagen Ag


 Method for protected communication of a vehicle patent thumbnailMethod for protected communication of a vehicle
A method for protected communication by a vehicle which includes generating a key pair consisting of a private key and a public key and/or of one or more symmetric keys for the vehicle or for a controller of the vehicle in the area of influence of the vehicle manufacturer, generating a first certificate using the key pair, introducing the key pair and the first certificate and/or the symmetric key into the vehicle or the controller, authenticating the vehicle or the controller to a new communication partner by generation of a new key pair for this communication path and sending a signed message together with the certificate, and authenticating a new communication partner to the vehicle or the controller using a signed message and a public key, which are produced by the new communication partner on the basis of a certification by the vehicle manufacturer.. .
Volkswagen Ag


 Airplane identity management with redundant line replaceable units (lrus) and composite airplane modifiable information (ami) patent thumbnailAirplane identity management with redundant line replaceable units (lrus) and composite airplane modifiable information (ami)
The present invention generally relates to one or more line replacement units (“lrus”) for an airplane. The lrus can include airline modifiable information (“ami”) that includes more than one public key certificates, wherein each of the more than one public key certificates uniquely identifies the airplane for ground communication based, at least in part, on a public key or a private key associated with the one or more public/private key pairs generated by a cryptographic key generator..
The Boeing Company


 Systems and methods for revoking and replacing signing keys patent thumbnailSystems and methods for revoking and replacing signing keys
In accordance with embodiments of the present disclosure, an information handling system may include a processor, an information handling resource communicatively coupled to the processor, and a management controller communicatively coupled to the processor and the information handling resource and configured to provide out-of-band management of the information handling system. The management controller may further configured to receive a message indicating that an existing private key associated with the information handling resource is compromised, the message including a replacement public key for replacing an existing public key associated with the information handling resource and associated with the existing private key and responsive to the message, cause the existing public key associated with the information handling resource to be replaced with the replacement public key..
Dell Products L.p.


 Recording data and using the recorded data patent thumbnailRecording data and using the recorded data
A method and system for recording data including content in a recording medium on a computer apparatus. First encrypted data, obtained by encrypting the data using a medium key created for each recording medium, is recorded in a recording medium.
International Business Machines Corporation


 Method and  error correcting code based public key encryption schemes patent thumbnailMethod and error correcting code based public key encryption schemes
The main difference between the proposed cryptosystem and known variants of the mceliece cryptosystem consists in the way the private generator matrix is disguised into the public one by inserting and mixing random columns within the private generator matrix.. .

 Security and data privacy for lighting sensory networks patent thumbnailSecurity and data privacy for lighting sensory networks
In one example, a method of protecting customer data in a networked system comprises collecting sensor data available at sensor nodes within a sensor network in communication with a service data platform over a network. The method includes encrypting the sensor data using a certified public key associated with a customer key-pair, the sensor data representing the customer data associated with sensitive identification information.
Sensity Systems Inc.


 Hiding a public key exchange in noise patent thumbnailHiding a public key exchange in noise
A process of hiding one or more public keys inside of random noise is introduced, whose purpose is to protect the privacy of the public keys. In some embodiments, the random noise is produced by quantum randomness, using photonic emission with a light emitting diode.

Secure transmission system with upgraded encryption strength

According to one embodiment, is configured to receive a request to communicate a message comprising a body to an intended recipient and to receive a first public key of the intended recipient and a second public key of the intended recipient. The apparatus is further configured to encrypt the body using a first message key to produce a first encrypted body, to encrypt the first message key using the first public key to produce a first encrypted message key, to encrypt the first encrypted message key and the first encrypted body using a second message key to produce a second encrypted body, and to encrypt the second message key using the second public key to produce a second encrypted message key.
Zixcorp Systems, Lnc.

Authentication apparatus based on public key cryptosystem, mobile device having the same and authentication method

An authentication apparatus, included in a device supporting a network communication, includes a certificate handler that receives a certificate of an opponent and parses or verifies the certificate of the opponent. Cryptographic primitives receive an authentication request of the opponent, generate a random number in response to the authentication request, generate a challenge corresponding to the random number, and verify a response of the opponent corresponding to the challenge.
Samsung Electronics Co., Ltd.

Decryption device, method, and circuit

A decryption method includes receiving encrypted data, in which the encrypted data is encrypted by an rsa public key; and performing at least one multiplication operation and at least one square operation according to an rsa private key and the encrypted data to acquire decrypted data. A false square operation is performed in performing one of the at least one multiplication operation, or a false multiplication operation is performed in performing one of the at least one square operation..
Realtek Semiconductor Corporation

Decryption device, method, and circuit

A decryption method includes receiving encrypted data, in which the encrypted data is encrypted according to an rsa public key; and performing a plurality of operations in sequence according to an rsa private key and the encrypted data to acquire a decrypted data. The operations include a plurality of decryption operations and at least one false operation.
Realtek Semiconductor Corporation

Using everyday objects as cryptographic keys

This disclosure involves the notion of using physical objects to generate public key-based authenticators and, in particular, to use “everyday” physical objects to create a generator seed for a key generator that will use that seed to generate a key pair comprising a public key, and its associated private key. In a preferred approach, the physical object is used to create a digital representation (of the physical object) that, together with some uniqueness associated to the user, gives rise to a key generator seed value.
International Business Machines Corporation

Secure connection network device, related apparatus, and system

A secure connection method for a network device includes: acquiring a public key operation value of a second device in an out-of-band manner; sending public key information of a first device to the second device; receiving public key information of the second device that is sent by the second device, and decrypting the public key information of the second device by using a private key of the first device, to obtain the public key of the second device; and performing a preset-algorithm operation on the public key of the second device to obtain a copy of the public key operation value of the second device, and after the copy of the public key operation value of the second device matches the public key operation value of the second device, accepting received connection information sent by the second device.. .
Huawei Device Co., Ltd.

Hipaa compliant communications system

A hipaa compliant communications systems (10) that enables the transfer of patient information from a repository (20) of such information to a device (30, 30′, 30″) at a location (40) where the information is needed. An initial dialogue between the repository and end user is established using a public key; but after that, each authorized transmission (at) is accomplished using a private key (pk) which is changed for each communication..

Network authorization system

A system includes a key repository and a network node. The key repository is configured to generate a private key and a public key of the network node, to communicate the private key and the public key to the network node, to verify whether the network node is authorized to operate on a network, to generate a first message indicating whether the network node is authorized to operate on the network, to encrypt the first message using the public key, and to communicate the encrypted first message to the network node.
Bank Of America Corporation

Remote encryption method and cryptographic center

A remote encryption method is executed by at least one processor of a cryptographic center. The cryptographic center connects to a sending end and to at least one receiving end.
Hon Hai Precision Industry Co., Ltd.

Data protection keys

Another embodiment provides a server system. The server system includes verifier logic.

Systems and methods for digital certificate and encryption key management

A certificate orchestration system for digital certificate and encryption key management is provided herein along with associated methods. The system includes a certificate orchestration server having a processing device in communication with a coupled storage system that is coupled to the certificate orchestration server.
Netflix, Inc.

Security token for certificate authentication and driving method therefor

The present invention relates to a security token for certificate authentication and a driving method thereof. The security token for certificate authentication, according to the present invention, comprises a security chip comprising: a key pair generation module for generating a pair of a private key and a public key for an authentication certificate; a digital signature module for generating a digital signature on the basis of the authentication certificate; an internal memory for storing the authentication certificate, the private and the public key; a near field communication (nfc) module for performing nfc with a wireless terminal; and a controller for controlling the key pair generation module, the digital signature module, the internal memory, and the nfc module..
Keypair Co., Ltd.

Code signing service

A facility for enrolling a software implementer in a code signing. In one example facility, the facility receives information identifying the implementer, and credentials authenticating the implementer.
Microsoft Technology Licensing, Llc

Computer-readable recording medium storing update program and update method, and computer-readable recording medium storing management program and management method

A computer-readable recording medium storing an update program is disclosed. An issuing request of a second public key certificate is sent to a server under a secure connection to the server using a first public key certificate.
Fujitsu Limited

Pre-personalization of electronic subscriber identity modules

Methods for provisioning electronic subscriber identity modules (esims) to electronic universal integrated circuit cards (euiccs) are provided. One method involves a provisioning server configured to encrypt the esim with a symmetric key (ke).
Apple Inc.

Image processing apparatus, controlling the same, and storage medium

When this image processing apparatus accepts an initial connection request from a mobile terminal, it displays a generated pin code on a console unit 210, and when it accepts information corresponding to the pin code from the mobile terminal, it compares that information with the generated pin code, and performs authentication. When the authentication is successful, it generates a public key and a private key, and transmits the generated public key to the mobile terminal..
Canon Kabushiki Kaisha

Entity authentication

Disclosed are an entity authentication method and device, involving: sending, by an entity a, a first identity authentication message to an entity b; inspecting, by the entity b after receiving the first message, the validity of a certificate of the entity a; sending, by the entity b, a second identity authentication message to the entity a; inspecting, by the entity a after receiving the second message, the correctness of field data therein; calculating, by the entity a, a secret information and message authentication code using a private key thereof and a temporary public key of the entity b, and sending a third message to the entity b; inspecting, by the entity b after receiving the third message, the correctness of field data therein; calculating, by the entity b, a secret information and message authentication code using a private key thereof and a public key of the entity a.. .
China Iwncomm Co., Ltd.

Apparatus and exchanging encryption key

Disclosed herein are an apparatus and method for exchanging an encryption key. According to an embodiment of the present disclosure, an encryption key exchange apparatus includes an encryption unit to generate a first diffie-hellman value and a first secret key using a first random integer and a public key of a second communication device and to encrypt certification data by a symmetric key cryptography using the first secret key, a transmitter to transmit the first diffie-hellman value and the encrypted certification data to the second communication device, a receiver to receive, from the second communication device, a second diffie-hellman value generated using a second random integer selected by the second communication device, and an acknowledgement message encrypted by the symmetric key cryptography using a second secret key generated from the second random integer and the first diffie-hellman value, and a decryption unit to generate the second secret key using the first random integer and the second diffie-hellman value and to decrypt the encrypted acknowledgement message using the generated second secret key..
Samsung Sds Co., Ltd.

Data encryption scheme using symmetric keys

In one aspect there is provided a computer-implemented method for encrypting a data element. The method includes generating a symmetric key and encrypting the data element using the symmetric key.

Method and proximal authentication of wireless electronic device

A method for communicating between devices is presented. The method includes dividing a first public key of a first device into at least two partial keys, transmitting the at least two partial keys through at least two communication channels having different physical characteristics, receiving a second public key of a second device through at least one of the at least two communication channels, authenticating the second device based on the received second public key, and performing secure communication with the second device using a public key generated based on the received second public key..
Samsung Electronics Co., Ltd.

Digital signature-over-voice for caller id verification

In an approach to caller id verification by digital signature, a computing device receives authenticating information associated with a caller. The computing device creates a call record based on the authenticating information.
International Business Machines Corporation

Digital signature-over-voice for caller id verification

In an approach to caller id verification by digital signature, a computing device receives authenticating information associated with a caller. The computing device creates a call record based on the authenticating information.
International Business Machines Corporation

Information processing system, server device, and non-transitory computer-readable medium

A server device that is a first-facility terminal device configured to transmit issuance information issued by a first facility to a user terminal device of a user of the first facility, includes: a first-facility encrypting unit configured to encrypt the issuance information issued by the first facility using a public key acquired from the user terminal device, and a first-facility terminal transmitting unit configured to transmit, when the user terminal device is connected to a network to which the first-facility terminal device is connected, the issuance information without encryption to the user terminal device, and to transmit, when the user terminal device is not connected to the network, the encrypted issuance information to the user terminal device.. .
Ricoh Company, Ltd.

Secure instant messaging system

A secure instant messaging (im) system integrates secure instant messaging into existing instant messaging systems. A certificate authority (ca) issues security certificates to users binding the user's im screen name to a public key, used by sending users to encrypt messages and files for the user.
Google Inc.

System and cryptographically signing web applications

Embodiments disclosed herein provide a method that includes receiving, at a client-side web browser, a minimal bootstrap payload from an application server; storing, by a client-side processor, the minimal bootstrap payload in a client-side local cache, where the locally cached minimal bootstrap payload is executed by the client-side processor before executing an application from the application server; the minimal bootstrap payload includes at least one public key and at least one uniform resource location (url) address of an application code payload.. .
Cyph, Inc.

Impact data manager for dynamic data delivery

In a preferred embodiment, a system for securely delivering source data to a destination system over a network includes a data manager system operatively connected to the network, where the data manager system includes circuitry configured to receive a public key from the destination system, generate a random session key, encrypt the session key with the public key using a public key cryptosystem, divide the source data into a number of chunks, compress each of the chunks, merge all of the compressed chunks into an assembled file, encrypt the assembled file with the session key using a symmetric-key cryptosystem, divide the encrypted assembled file into a number of parts, send each of the parts to the destination system over the network, and send the encrypted session key to the destination system over the network.. .
Aon Benfield Global, Inc.

Consensus adding data to a blockchain

A method and apparatus is presented for reaching consensus on adding data to a distributed ledger system in which no central trusted authority is available, comprising sending an announcement message by a network connected device to a plurality of network connected devices over a peer-to-peer network, said message providing an identification of the network connected device using a public key of a public/private key pair, a unique address identifier, and a hash. Subsequently, after a waiting period measured in, for example, time or blocks of data, the network connected device may submit data for inclusion in the distributed ledger.

Multi-factor simple password exponential key exchange (speke) authentication

A method relates to receiving, by a processing device of an authentication server over a public network, an authentication request from a client device, the authentication request comprising a user identifier associated with first factor data, in which the first factor data comprises a password stored in a storage associated with the authentication server, calculating a generator value in view of the first factor data and a second factor data associated with the user identifier, and generating a session key in view of the generator value and a first public key received from the client device.. .
Red Hat, Inc.

Method, apparatus and system for dynamically controlling secure vehicle communication based on ignition

A method of controlling secure vehicle communication in a vehicle gateway includes: detecting whether a vehicle is started; generating a new public key for each network connected to the vehicle gateway for message encryption upon detecting that the vehicle is started; transmitting a first message including the new public key; allocating a new identification (id) to each controller connected to the vehicle gateway with reference to a stored routing table for message routing between controllers upon detecting that the vehicle is started; and transmitting a second message including the new id.. .
Hyundai Motor Company

Server public key pinning by url

A method of ensuring the identity of a first processing device to a second processing device allows for secure network communication between the devices. A network resource address including an encoded trusted identifier in a portion of the address excluding the host name of the first processing device are provided to a second processing device by a trusted distribution mechanism.
Ca, Inc.

Location aware cryptography

Encrypted data transmitted from a second entity to a first entity may be received. The encrypted data may be encrypted by a location based public key based on a public key and a location associated with the second entity.
Cryptography Research, Inc.

Method of managing credentials in a server and a client system

A method for deploying credentials in a server and a client system including three devices. The second device has primary credentials including a public key, a private key and a primary certificate.
Gemalto Inc.

System and mixed multivariate digital signature

A system of mixed multivariate digital signature is disclosed. The system includes a signature module configured to sign a message to be signed, and a verification module configured to verify a signature.
South China University Of Technology

Visp authentication service for third party applications

An authentication device receives, from an application executing at a mobile device, a request for an authentication token, the request including an application identifier and an encrypted session identifier (sid). The application identifier identifies the application and the sid uniquely identifies a session between the application and a destination network device.
Verizon Patent And Licensing Inc.

Methods and systems for distributing encrypted cryptographic data

A method for distributing encrypted cryptographic data includes receiving, by a key service, from a first client device, a request for a first public key. The method includes transmitting, by the key service, to the first client device, the first public key.
Virtru Corporation

Shared symmetric key encryption

A method for encrypting a message is described in which a public key and a private key are generated. The public key is encrypted using a shared symmetric key shared with an agent.
Hewlett-packard Development Company, L.p.

Secure digital signature apparatus and methods

The invention is a secure digital signature device which generates digital signature key pairs using a hardware random number generator. It transmits public keys to one or more smart devices and signs bit strings at the request of smart devices without exposing private keys.

Method, device, and system of provisioning cryptographic data to electronic devices

System, device, and method of provisioning cryptographic assets to devices. A method includes: (a) generating a delegation message at a first provisioning server; the delegation message indicating provisioning rights that are delegated by the first provisioning server to a second provisioning server with regard to subsequent provisioning of cryptographic assets to an electronic device; wherein generating the delegation message comprises at least one of: (a) inserting into the delegation message an association key unknown to the first provisioning server, encrypted using a public key of the electronic device; (b) inserting into the delegation message a public key of the second provisioning server; enabling the electronic device to locally generate the association key unknown to the first provisioning server; (b) delivering the delegation message to the electronic device; (c) at the second provisioning server, based on the delegation message, provisioning cryptographic assets to the electronic device, using the association key..
Arm Technologies Israel Ltd.

Method for ciphering and deciphering digital data, based on an identity, in a multi-authorities context

Determining a product of said digital data m with k+1 elements belonging to said group t, each of said k+1 elements belonging to said group t being obtained via applying a pairing function on a combination of elements of a master public key associated to one of the n trusted authorities, said k random element(s) and output of said applying a hash function, delivering a second part of said ciphertext of said digital data m.. .

Re-programmable secure device

A re-programmable wireless device can store data securely and use near field communication (nfc) to exchange functionality data and/or program code from a central server system through a mobile device. A user requests a new re-programmable wireless device or a new re-programmable wireless device function via an application on the mobile device.
Google Inc.

Crypto key recovery and social aggregating, fractionally efficient transfer guidance, conditional triggered transaction, datastructures, apparatuses, methods and systems

The crypto key recovery and social aggregating, fractionally efficient transfer guidance, conditional triggered transaction, datastructures, apparatuses, methods and systems (“socoact”) transforms mkadsd generation request, trigger event message inputs via socoact components into transaction confirmation, recovery notification outputs. A multiple key account data structure datastore (mkadsd) generation request may be obtained from a user.
Fmr Llc

Secure escrow service

A method of restoring confidential information items of a first device to a second device by using a set of servers. The method generates a public and private key pair and ties the private key to the hash of executable code of the servers at the time of generating the public and private keys.
Apple Inc.



Public Key topics:
  • Public Key
  • Private Key
  • Encryption
  • Digital Signature
  • Computer Program
  • Certificate
  • Hash Function
  • Electronic Signature
  • Secret Key
  • Authentication
  • Decryption
  • Storage Device
  • Repository
  • Polynomial
  • Cryptography


  • Follow us on Twitter
    twitter icon@FreshPatents

    ###

    This listing is a sample listing of patent applications related to Public Key for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Public Key with additional patents listed. Browse our RSS directory or Search for other possible listings.


    0.6417

    file did exist - 2389

    2 - 1 - 52